课堂实验

实验:针对不同的用户设置不同的共享目录和权限

vim /etc/samba/smb.conf
[global]
workgroup = WANGGROUP
security = user
netbios name = smbsrv7
passdb backend = tdbsam
log file = /var/log/samba/log.%I
log level = 2

config file = /etc/samba/conf.d/%U
[share]
comment=samba share dir
path=/data/tools
read only = yes

[root@centos7 conf.d]#cat /etc/samba/conf.d/smb2
[share]
path=/data/smb2
writeable=yes

[root@centos7 conf.d]#cat /etc/samba/conf.d/smb3
[share]
path=/data/smb3

实验:多用户挂载

client
useradd smb1
useradd smb2
useradd smb3

vim /etc/fstab
//192.168.30.7/share /mnt cifs username=smbshare,password=centos,multiuser 0 0

mount -a

su – smb1
cifscreds add sambaserverip

proxy
isa

GPL
http://www.magedu.com/news
http://www.magedu.com/study/
tcp 80

QQ IP
udp 8000
tcp 443 https://www.baidu.com/

数据www.tencent.com
msn :www

isa server

http://ip/a.vbs

1M
mtu 1500
ethernet(ip(tcp(app(data))))

http tcp80 10
https tcp443 10

web 10
jump

实验:自定义链

使用自定义链
iptables -N WEB
iptables -A WEB -p tcp -m multiport –dports 80,443 -j ACCEPT
iptables -I INPUT -s 192.168.30.0/24 -j WEB
iptables -vnL

修改
iptables -R WEB 1 -p tcp -m multiport –dports 80,443,8080 -j ACCEPT

删除自定义链
iptables -D INPUT 1
iptables -D WEB 1
iptables -X WEB

fileshare:samba,ftp,
web:http https
manage:ssh telnet

lamp

client — > apache+php fpm A –> mysql B

manager C
B:
iptables -F
iptables -A INPUT -s AIP -p tcp –dport 3306 -j ACCEPT
iptables -A INPUT -s CIP -p tcp –dport 22 -j ACCEPT
iptables -A INPUT -j REJECT

A:
iptables -F
iptables -A INPUT -i lo -j ACCEPT
iptables -A INPUT -p tcp –dport 80 -j ACCEPT
iptables -A INPUT -s CIP -p tcp –dport 22 -j ACCEPT
iptables -A INPUT -j REJECT

ssh any reject
http source 192.168.30.0/24 accept

-m multport –dports 80,443

iptables -A FORWARD -m time –timestart 1:00 –timestop 10:00 –weekdays 1,3,5 -j REJECT

实验:实现内网的安全

ptables -A FORWARD -j REJECT
iptables -I FORWARD -m state –state ESTABLISHED,RELATED -j ACCEPT
iptables -I FORWARD 2 -s 192.168.30.0/24 -d 10.0.0.0/8 -m state –state NEW -j ACCEPT

A:10.0.0.0/8
B:172.16.0.0/16 – 172.31.0.0/16 172.16.0.0/12
C:192.168.0.0/24 – 192.168.255.0/24 192.168.0.0/16

实验:实现SNAT

lan:192.168.30.0/24
nat server:
lan interface:192.168.30.17
wan interface: 10.0.0.254
wan: 10.0.0.0/8
wanserver 10.0.0.10

静态IP
iptables -t nat -A POSTROUTING -s 192.168.30.0/24 -j SNAT –to-source 10.0.0.254
动态IP
iptables -t nat -A POSTROUTING -s 192.168.30.0/24 -j MASQUERADE

实验:实现DNAT

iptables -t nat -A PREROUTING -d 10.0.0.254 -p tcp –dport 80 -j DNAT –to-destination 192.168.30.7:8080

实验:端口转发

iptables -t nat -A PREROUTING -d 192.168.30.7 -p tcp –dport 80 -j REDIRECT –to-ports 8080

 

QQ截图20180701180818

本文来自投稿,不代表Linux运维部落立场,如若转载,请注明出处:http://www.178linux.com/102079

发表评论

登录后才能评论

This site uses Akismet to reduce spam. Learn how your comment data is processed.

联系我们

400-080-6560

在线咨询

工作时间:周一至周五,9:30-18:30,节假日同时也值班

QR code